Cyber Security is the practice of protecting electronic data systems from criminal or unauthorised attacks. Cyber Security serves as a preventative measure to defend confidential data and protect data processes and procedures from unwanted breaches.
Entry Requirements
In order to qualify for entry to the Bachelor of Data Science applicants must meet the course entry criteria as prescribed. International students who's first language is not English must also meet the English Proficiency Requirements. Please refer to the prescribed course Entry Requirements.
This intensive course will allow you achieve a professional doctorate in Information Technology.
Entry Requirements
To be eligible for admission as a candidate for a Doctor of Information Technology, an applicant must have: *a Bachelor Degree with at least a 2A Honours normally in the same discipline (AQF level 8); or *a Masters Degree normally in the same discipline (AQF level 9) and satisfy the Dean of Graduate Studies with evidence of substantive and significant scholarly or professional attainments; or *a Bachelor Degree normally in the same discipline (AQF level 7) and satisfy the Dean with evidence of substantive and significant scholarly or professional attainments including satisfactory research preparation equivalent of AQF level 8 or 9.
Future proof your career opportunities and graduate with a flexible skill set that makes you highly employable in an uncertain future by undertaking a combined Law and IT degree.
Entry Requirements
90 ATAR or equivalent - Students who have successfully completed the Murdoch College course with a minimum average mark of 78% or higher
Become an industry-ready software engineer with real-world experience in just four years.
Entry Requirements
Admission requirements
The University of Western Australia welcomes applications from international and domestic school-leavers. If you're interested in studying this major, find out the admission details below.
Minimum entry requirements
Minimum entry requirements
Below you'll find a list of admission equivalencies for this course's Australian Tertiary Admissions Rank (ATAR).
For applicants with recent secondary education, information on admission criteria is available on our entry requirements page or on the UWA Handbook for course specific requirements and prerequisites.
Admission requirements
Admission Requirements
Scaled score of at least 50 in Mathematics Methods ATAR
Scaled score of at least
one
of the following three subjects*: Chemistry ATAR, Physics ATAR or Mathematics Specialist ATAR
*All three subjects are recommended. If you do not have all three, then you can use up to two of your free electives to pick up missing prerequisite knowledge in your first year.
Admission Requirements
ADMISSION REQUIREMENTEnglish competency
English is the language of instruction and assessment at UWA and you will need to meet the English language requirements of the University to be eligible for a place.
Minimum overall IELTS score of 6.5, with no band less than 6.0.
In this Microsoft 365 Fundamentals course, you will learn how to: Differentiate between the various cloud service models. Identify the key differences between Microsoft 365 subscriptions. Plan for migration to Microsoft 365 services.
Entry Requirements
Key TopicsModule 1: Cloud computing
Define cloud computing.
Describe the shared responsibility model.
Define cloud models, including public, private, and hybrid.
Identify appropriate use cases for each cloud model.
Describe the consumption-based model.
Compare cloud pricing models.
Module 2: Benefits of using cloud services
Describe the benefits of high availability and scalability in the cloud.
Describe the benefits of reliability and predictability in the cloud.
Describe the benefits of security and governance in the cloud.
Describe the benefits of manageability in the cloud.
Module 3: Cloud service types
Describe Infrastructure as a Service (IaaS).
Describe Platform as a Service (PaaS).
Describe Software as a Service (SaaS).
Identify appropriate use cases for each cloud service (IaaS, PaaS, SaaS)
Module 4: What is Microsoft 365
Describe Office 365, Microsoft 365, and Windows 365
Describe how Microsoft 365 empowers workers for hybrid and flexible work
Create a Microsoft 365 trial organization
Module 5: Productivity solutions of Microsoft 365
Describe how the capabilities of Microsoft 365 can boost productivity
Describe how Microsoft 365 Apps help people craft compelling content in real time
Describe how the capabilities of the work management tools optimize operations
Describe additional Microsoft 365 productivity apps
Module 6: Collaboration solutions of Microsoft 365
Describe how the collaboration tools of Microsoft 365 promote synergy in the workplace
Describe how Microsoft Teams helps boost teamwork
Describe how Microsoft Viva helps organizations create thriving work cultures
Describe how Yammer communities can help foster connections within your organization
Module 7: Endpoint modernisation, management concepts and deployment options of Microsoft 365:
Describe the endpoint modern management capabilities of Microsoft 365
Describe the differences between Windows 365 and Azure Virtual Desktop
Describe the deployment and release models for Windows-as-a-Service
Describe the deployment methods and update channels for Microsoft 365 Apps
Module 8: Analytics capabilities of Microsoft 365
Describe how Viva Insights helps people and organizations work smarter and achieve balance
Describe the capabilities of the Microsoft 365 admin center and user portal
Describe the reports available in the Microsoft 365 admin center and other admin centers
Module 9: Services and identity types of Azure AD
Describe what Azure AD does.
Describe the types of identities Azure AD supports.
Module 10: Access management capabilities of Azure AD
Describe Conditional Access in Azure AD.
Describe the benefits of Azure AD roles and role-based access control
Module 11: Threat protection with Microsoft 365 Defender
Describe the Microsoft 365 Defender service.
Describe how Microsoft 365 Defender provides integrated protection against sophisticated attacks.
Describe and explore the Microsoft 365 Defender portal.
Module 12: Security capabilities of Microsoft Sentinel
Describe the security concepts for SIEM and SOAR.
Describe how Microsoft Sentinel provides integrated threat management.
Describe the pricing models of Microsoft Sentinel.
Module 13: Compliance management capabilities of Microsoft Purview
Describe the Microsoft Purview compliance portal.
Describe Compliance Manager.
Describe the use and benefits of compliance score.
Module 14: Service Trust Portal and Privacy at Microsoft
Describe the offerings of the Service Trust Portal.
Describe Microsoft's Privacy principles.
Describe Microsoft Priva
Module 15: Microsoft 365 pricing, licensing, and billing options
Describe the pricing models available for Microsoft Cloud services
Describe billing management features such as billing frequency and methods of payment
Describe the differences between base licensing and add-on licensing
Module 16: Support offerings for Microsoft 365 services
Describe the support offerings available for Microsoft 365 and how to create a support request
Describe service level agreement (SLA) concepts
Identify how to track service health through the Microsoft 365 admin center
Describe how organizations can provide feedback on Microsoft 365 products and services
Our Diploma of Information Technology is an 8-unit course taught over two or three trimesters. It has been designed as a pathway to a Bachelor of Information Technology (Business Information Systems) degree for domestic and international students.
Entry Requirements
Entry Requirements
If you are an international student, you must demonstrate English proficiency of IELTS 5.5 overall (each band 5.0 or above) or equivalent.
You will also need to meet the academic entry requirements to enrol in this program.
Completion of Australian high school Year 12 with an ATAR of 50, or international equivalent.
For detailed information about the academic entry requirements for your country of origin please refer to our Entry Requirements page.
If you're an information technology professional looking to pursue a senior management role, specialise in data science and advance your IT career - the Master of Business Administration / Master of Information Technology is for you.
Entry Requirements
Recognised Bachelor's degree in IT (AQF Level 7) AND evidence of two years of professional work experience; OR recognised non-IT Bachelor's degree plus an approved Diploma in IT (AQF Level 8); OR recognised non-IT Honours degree (AQF Level 8) plus five or more years of relevant experience. Recognition of relevant and current informal or non-formal learning may be used for entry requirements and should be discussed with the Academic Chair.
With a Master of Science in Information Technology, you'll upgrade your information technology qualifications and experience to help take your career to the next level.
Entry Requirements
Recognised Australian Computer Society (ACS) accredited Bachelor's degree in IT (AQF Level 7); OR Recognised Bachelors' degree (AQF Level 7) plus an approved qualification in IT (AQF Level 8); OR Recognised Honours degree (AQF Level 8) plus 5 or more years of relevant experience. Recognition of relevant and current informal or non-formal learning may be used for entry requirements, and should be discussed with the Academic Chair.
Are you looking to further your career in information technology? This course will allow you to take the first step in developing as an IT professional and expanding your qualification and knowledge within the field.
Entry Requirements
Recognised Bachelor's degree in IT (AQF Level 7); OR Recognised Bachelor's degree (AQF Level 7) in a STEM discipline, other than IT, with appropriate levels of training in programming or data science or data analytics; OR Recognised non-IT Bachelor's degree (AQF Level 7) and two years of relevant professional experience; OR Recognition of demonstrated knowledge and skills through informal and non-formal learning and extensive relevant professional experience (5 years plus), subject to the approval of the Academic Chair.
Get the technical, problem solving and professional skills you need to be in high demand across almost every industry with a Bachelor of Information Technology.
This training course in Azure Fundamentals is tailored for IT professionals who are new to Azure. This audience is eager to acquaint themselves with our offerings and gain practical exposure to the product.
Entry Requirements
Key Topics
Module 1: Cloud computing concepts.
Define cloud computing.
Describe the shared responsibility model.
Define cloud models, including public, private, and hybrid.
Identify appropriate use cases for each cloud model.
Describe the consumption-based model.
Compare cloud pricing models.
Module 2: Benefits of using cloud services
Describe the benefits of high availability and scalability in the cloud.
Describe the benefits of reliability and predictability in the cloud.
Describe the benefits of security and governance in the cloud.
Describe the benefits of manageability in the cloud.
Module 3: Cloud service types
Describe Infrastructure as a Service (IaaS).
Describe Platform as a Service (PaaS).
Describe Software as a Service (SaaS).
Identify appropriate use cases for each cloud service (IaaS, PaaS, SaaS).
Module 4: Azure architectural components
Describe Azure regions, region pairs, and sovereign regions.
Describe Availability Zones.
Describe Azure data centres.
Describe Azure resources and Resource Groups.
Describe subscriptions.
Describe management groups.
Describe the hierarchy of resource groups, subscriptions, and management groups.
Module 5: Azure compute and networking services
Compare compute types, including container instances, virtual machines, and functions.
Describe application hosting options, including Azure Web Apps, containers, and virtual machines.
Describe virtual networking, including the purpose of Azure Virtual Networks, Azure virtual subnets, peering, Azure DNS, VPN Gateway, and ExpressRoute.
Define public and private endpoints.
Module 6: Azure storage services
Compare Azure storage services.
Describe storage tiers.
Describe redundancy options.
Describe storage account options and storage types.
Identify options for moving files, including AzCopy, Azure Storage Explorer, and Azure File Sync.
Describe migration options, including Azure Migrate and Azure Data Box.
Module 7: Azure identity, access and security
Describe directory services in Azure, including Azure Active Directory (AD) and Azure AD DS.
Describe authentication methods in Azure, including single sign-on (SSO), multifactor authentication (MFA), and passwordless.
Describe external identities and guest access in Azure.
Describe Azure AD Conditional Access.
Describe Azure Role Based Access Control (RBAC).
Describe the concept of Zero Trust.
Describe the purpose of the defense in depth model.
Describe the purpose of Microsoft Defender for Cloud.
Module 8: Cost management in Azure
Describe factors that can affect costs in Azure.
Compare the Pricing calculator and Total Cost of Ownership (TCO) calculator.
Describe Azure Cost Management Tool.
Describe the purpose of tags.
Module 9: Tools for governance and compliance in Azure
Describe the purpose of Azure Blueprints.
Describe the purpose of Azure Policy.
Describe the purpose of resource locks.
Describe the purpose of the Service Trust portal.
Module 10: Tools for managing and deploying Azure resources
Describe Azure portal.
Describe Azure Cloud Shell, including Azure CLI and Azure PowerShell.
Describe the purpose of Azure Arc.
Describe Azure Resource Manager (ARM) and Azure ARM templates.
Module 11: Monitoring tools in Azure
Describe the purpose of Azure Advisor
Describe Azure Service Health
Describe Azure Monitor, including Azure Log Analytics, Azure Monitor Alerts, and Application Insights
Be a trusted leader at the forefront of cyber security.
Entry Requirements
To gain entry to the Master of Cyber Security, applicants must:
Have a Bachelor degree in any discipline, or;
Demonstrate a minimum of five years' relevant professional experience
All applicants must satisfy English competency standards
Special entry
Special entry may be considered for students with a cognate first degree (or with appropriate experience) who can apply for a reduced course duration:
1.5 years full time (3 years part time) - 180 credit points
Admission is based on:
Bachelor degree in a related discipline*, or
Bachelor degree in any discipline, plus five years relevant work experience^, or
Graduate Certificate of Cyber Security (or equivalent), or
Evidence of academic capability judged to be equivalent.
*Related discipline refers to any cyber security/ICT-related discipline
^Relevant work experience constitutes Senior/Managerial positions to be approved by the Course Coordinator.
The Graduate Certificate in Business Analytics is suitable for students already employed in business who desire an enriched understanding of how analytics can enhance their decision-making in the workplace - irrespective of the position they hold.
With a major in Cybersecurity from UWA, you'll be ready for a range of specialist cybersecurity roles. With a major in Cybersecurity from UWA, you'll be ready for a range of specialist cybersecurity roles.
Entry Requirements
Admission requirements
The University of Western Australia welcomes applications from international and domestic school-leavers. If you're interested in studying this major, find out the admission details below.
Minimum entry requirements
Minimum entry requirements
Below you'll find a list of admission equivalencies for this course's Australian Tertiary Admissions Rank (ATAR).
For applicants with recent secondary education, information on admission criteria is available on our entry requirements page or on the UWA Handbook for course specific requirements and prerequisites.
Admission requirements
Mathematics requirement
This major requires a certain level of Mathematics. If you do not meet this level, you may be able to take additional Mathematics units in your first year to satisfy this requirement.
WACE prerequisite: Mathematics Methods ATAR
Mathematics requirement
ADMISSION REQUIREMENT
English competency
English is the language of instruction and assessment at UWA and you will need to meet the English language requirements of the University to be eligible for a place.
Minimum overall IELTS score of 6.5, with no band less than 6.0.
Learn how to manage, protect and leverage data collected from everyday activities to drive business decisions, solve social problems, and inform better healthcare with a Graduate Diploma in Artificial Intelligence and Data Science.
Entry Requirements
Recognised Australian Computer Society (ACS) -accredited Bachelor's degree in IT (AQF Level 7); OR recognised Bachelor's degree (AQF Level 7) plus an approved qualification in IT (AQF Level 8); OR recognised Bachelor's degree(AQF Level 7) plus two years of relevant IT experience; OR recognised Honours degree (AQF Level 8) plus relevant IT experience. Recognition of relevant and current informal or non-formal learning may be used for entry requirements, and should be discussed with the Academic Chair.
Learn the analytical skills, theories and strategies you need to build an exciting career in global security, where every working day will be different.
Entry Requirements
As per normal undergraduate admission requirements. A minimum ATAR of 70 is required.
Start your career in the fast growing information technology (IT) industry with this qualification. This course will provide you with the knowledge to develop basic network administration skills.
Entry Requirements
An IELTS score (academic) of 6.0 with no band score less than 5.0 or equivalent.
Completion of the equivalent of Australian Year 10.
Please view Admission requirements for your country of origin.